CVE-2023-53231 — Linux vulnerability
6 documents6 sources
Severity
5.5MEDIUMNVD
EPSS
0.0%
top 92.85%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 15
Description
In the Linux kernel, the following vulnerability has been resolved:
erofs: Fix detection of atomic context
Current check for atomic context is not sufficient as
z_erofs_decompressqueue_endio can be called under rcu lock
from blk_mq_flush_plug_list(). See the stacktrace [1]
In such case we should hand off the decompression work for async
processing rather than trying to do sync decompression in current
context. Patch fixes the detection by checking for
rcu_read_lock_any_held() and while at it …
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6
Affected Packages5 packages
▶CVEListV5linux/linuxaea1286dcbbb87cf33595c2ac8b153c29a4611cb — 597fb60c75132719687e173b75cab8f6eb1ca657+2
Patches
🔴Vulnerability Details
2OSV▶
CVE-2023-53231: In the Linux kernel, the following vulnerability has been resolved: erofs: Fix detection of atomic context Current check for atomic context is not suf↗2025-09-15
GHSA▶
GHSA-72rq-7p7f-9f9j: In the Linux kernel, the following vulnerability has been resolved:
erofs: Fix detection of atomic context
Current check for atomic context is not s↗2025-09-15